Red Hot Cyber, il blog italiano sulla sicurezza informatica
Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Select Italian
Search
Redhotcyber Banner Sito 320x100px Uscita 101125
970x120
Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Bloody Wolf Attacks Central Asia with NetSupport RAT via Java Exploits

Redazione RHC : 29 November 2025 08:57

Group-IB specialists have recorded new attacks by the Bloody Wolf hacker group, which has been targeting Kyrgyzstan since June 2025 and has expanded its operations to Uzbekistan since October. The financial sector, government agencies, and IT companies are at risk.

According to researchers, the attackers are impersonating the Kyrgyz Ministry of Justice, using fake PDF documents and seemingly legitimate domains, but are actually distributing Java archives (JARs) containing the NetSupport RAT malware.

Bloody Wolf has been active since at least the end of 2023. Previously, the group targeted Kazakhstan and Russia, distributing STRRAT and NetSupport via phishing attacks. The group’s geographic reach has now expanded to Central Asia, but its tactics remain the same: in emails, the group impersonates government officials, attempting to trick victims into opening malicious attachments.

The attack scheme is simple. The victim receives an email containing a link to a seemingly important document. Clicking the link downloads a JAR file along with instructions for installing Java Runtime. The email claims that Java is required to view the files, but in reality, the downloader downloads NetSupport RAT from the hacker’s server and installs itself on the system in three ways: via a scheduled task, a registry entry in the Windows registry, and a BAT file in the startup folder.

Experts write that during the attacks on Uzbek organizations, hackers used geofencing : if a request came from outside Uzbekistan, the victim was redirected to the legitimate website data.egov.uz. However, requests from within the country triggered the download of a JAR file from a link embedded in a PDF.

Note that all of the group’s JAR downloaders are compiled using an older version of Java 8 (released in March 2014). Experts believe the group has its own generator or template for creating these files. Furthermore, the version of the NetSupport malware is also far from recent, dating back to October 2013.

The researchers conclude that Bloody Wolf demonstrates that even inexpensive commercial tools can be transformed into effective weapons for targeted and sophisticated attacks.

  • #hackers
  • Bloody Wolf
  • Central Asia
  • cyber attacks
  • cyber security
  • Group-IB
  • Java Exploits
  • Malware
  • NetSupport RAT
  • Threat Actors
Immagine del sitoRedazione
The editorial team of Red Hot Cyber consists of a group of individuals and anonymous sources who actively collaborate to provide early information and news on cybersecurity and computing in general.

Lista degli articoli